ואצאפ

DIGITAL FORENSICS LEVEL 1 COURSE

DIGITAL FORENSICS LEVEL 1 COURSE // DIGITAL FORENSICS LEVEL 1 COURSE //

+ADVANCED

level/floor

10 Weeks

Duration

50

academic hours

not yet determined

Course Opening Date

On Demand

Days & Hours

  • About the course
  • Study Divisions
  • More Courses

01

About the Course

Level 1 Course

The "Investigation Experts" curriculum is an original program built in Israel. It was designed to train Forensics experts to operate and control the means of solving computer events, to recover and solve software and hardware failures, and of course - for their future prevention.

Wikipedia defines the term "Computer Forensics" as a branch of the science of forensic science intended - the identification of legal evidence found in the recesses of the computer and its storage media. In some cases, the industry is also referred to as Digital Forensics.

 

The Forensics tool set is designed to provide a means for resolving computer crime events.

This type of tool is usually used in the following cases:

In the legal framework - for the purpose of examining computer systems that use the defendants, the defendants, or the plaintiffs.

to recover information on media damaged by hardware or software failure.

to understand the processes taking place in the system for performance improvement, or for the recovery of a fault for its prevention in the future.

to understand the processes that take place in the system when it comes to attacking, to understand the attack and prevent it in the future, or in order to identify the attacker.

Read more

02

Introduction

Organizations find it very difficult to identify, remove, and defend against digital attacks. Sometimes complainants think that events on the computer or corporate network are the result of a malfunction and fail to identify an external attack. The attacks are intense with cover-up and cover-up. An investigative expert is required to identify an attack, decrypt all components of the attack, locate all parts of the network, respond, remove all attack elements, and recommend proper protection against attacks of a similar nature.

 

A protection researcher will engage in online investigations to learn about new types of attacks the organization has yet to experience and will try to identify vulnerabilities that could potentially reach outside the organization.

 

An investigative expert is a professional with several specialties: in the field of data recovery, or in the field of criminal identification, or in the field of abusive identification.

 

An expert is required to have the knowledge and tools to identify an attack, decrypt all elements, locate all parts of the network, respond, remove all attack elements, and recommend proper protection against attacks of a similar nature. In some cases, a researcher has to be able to recover files that have been deleted or lost, or find files that have been suppressed, and in criminal or commercial functioning, he has to find digital information of various types in the different computer and network media, and be exposed in such a way that it can also be used in legal institutions, so that it is recognized as acceptable in court.

 

In the context of cyber protection, an investigator will conduct a proactive investigation activity to learn about new types of attacks the organization has yet to experience and will attempt to locate weak spots of the organization for which potential attacker may reach outside the organization.

 

The researcher’s work requires a comprehensive background in programming, communication, deployment, web applications, familiarity with legal implications, regulations, and regulations relevant to the organization in which he is employed, and of course - a thorough familiarity with the information security architecture.

 

The researcher’s work requires a comprehensive background in programming, communication, deployment, web applications, familiarity with legal implications, regulations, and regulations relevant to the organization in which he is employed, and of course - a thorough familiarity with the information security architecture.

Read more

03

Target Audience

Infrastructure practical knowledge - operating systems and networks, and basic knowledge in security tools, as well as BA or MA graduates in computer science, software/hardware engineering.

The track is not suitable for beginners.

Read more

04

Admission conditions

The course is intended for those with practical knowledge in the field of infrastructure (operating systems and communication, and requires basic knowledge in basic security tools and basic knowledge in code development), as well as graduates of the Bachelor’s or Master’s degree in computer science, software engineering or hardware.

Read more

05

Program Purpose

Training professionals in the field of investigation of events in the cyber security world.

Read more

06

Duration

Class Hours: 50 hours

Home Practice: 80 hours

 

Read more

07

Price

7,500NIS

Read more

08

Recognition

See Security is known as a college with the highest level of study, conducted in a social and cooperative learning atmosphere. The professionals, IT managers in Israel and employers of all kinds, are well acquainted with the college and its demands from the students and prefer to take in the ranks of graduates who have been filtered, trained, and tested through their studies in the college.

Read more

09

Study Divisions

  • Cyber Security Concepts 
  • Intro to Incident Response 
  • Incident Response Life Cycle
  • Incident Response Phases 
  • Malware & Malware Analysis  
  • Analysis Techniques  
  • Types of Malware
  • Malware Behavior
  • Persistence Mechanisms 
  • Creating a Safe Analytical Environment
  • Armored Malware 

Why you need you a Malware Analysis Lab and How to buildit 

Why do you need a Malware AnalysisLab?

How to buildit?

  • Step 1. Yournetwork
  • Step 2. Virtualization
  • Step 3. AnalysisMachines
  • Step 4. Testing your environment
  • Step 5. Start your MalwareAnalysis
  • Quiz
  • Introduction & Definition
  • Crime scene
  • The forensic lab & tools
  • The Investigator Lab
  • The Lab
  • Hardware Pre-Requisites
  • The Investigator Software
  • Cyber Crime Workflow
  • Digital Forensics and Enforcement of the Law
  • The Fourth Amendment
  • Chain of Custody
  • Anti-computer forensics
  • Anti-Forensics Methods
  • Anti-Forensics Tools
  • Practical Windows Forensics
  • Digital Forensics-Primary Goals
  • Forensics Analysis Process
  • Forensics Investigation Process
  • Forensics Analysis Checklist
  • Most important Artifacts of Windows 7 / 10
  • Windows Registry
  • MRU
  • Shellbags
  • JumpLists
  • USB Device
  • MCAB Times
  • Recycle Bin
  • Event Log
  • RDP
  • db
  • Prefetch
  • Page Files
  • Create Memory Dump
  • Analysis Dump Files:
  • Volatility
  • Volix
  • Memorize
  • Cleanup
  • Wrting Report for Digital Forensics
  • Overview & Case Summary
  • Forensics Acquisition & Exam Preperation
  • Findings and Report
  • Module 11 – Final Exam